SlideShare a Scribd company logo
1 of 76
Download to read offline
Identity 101
Boot Camp
Identity North
June 15th, 2016
Toronto
Kaliya “Identity Woman”
Internet
Identity
Workshop
Co-Founded in 2005
Born in Vancouver
Played Water Polo
UC Berkeley
Planetwork
Identity Commons
Identity Gang
Canada
Founded
in 2010 ECOSYSTEM
CONSORTIUM
PERSONAL
DATA
Today Independent
Identity Consulting
Who is
1. Big Picture - What is Identity?
2. Digital Identity - Key Terms
3. ID in Context of Society
Enterprise, Government, Commons
4. User-Centric/Self-Sovereign Identity
5. Spectrum of Identity
6. Big Picture - ID Resources
7. Questions and Answers
Outline
Identity is
socially constructed
and contextual.
Who I am
Who I present
myself to be
How I am seen
In a
given
context
Contexts Roles (Persona)
Family
Parent, Child
Brother, Sister
Religious Life
Hobbies
Professional Work
Congregant
Religious Leader
Creator, Maker
Teacher
Employee, Employer
Contractor
Professionally Licensed
Atoms
Bits
Easy to move physically
between contexts.
To Present Different Selves
Movement Between Different Contexts
Requires Different
Non-Correlated Identifiers
Persona 1 Persona 2
Context 1 Context 2
Persona 1
Persona 2
Context
Context 1 Context 2
Persona
Understanding Key
Digital Identity Terms
Enrollment
Proofing/Verification
Attributes/Claims
Identifiers - Directed, End-Points
Credentials
Authentication - AuthN
Multi-Factor Authentication - MFA
Authorization - AuthZ
Enrollment
Technology Thing
Process
Policy
Procedures
&
Enrollment: The processes that an institution/
organization uses to ‘onboard”and create an
identity for a particular individual.
Enrollment —> Credential Issuance
Proofing / Verification
Triangulation
Identity Proofing or Verification: The processes used to
check the veracity of identity claims about a person. This is
often done in an enrollment process.
Attributes Claims
Attributes and Claims can be both self asserted by a
person or ascribed to a person by an institution.
Identifier
Identifies are pointers at people.
Within institutional or network systems these are often
numbers that point particular people.
Identifiers Claims
Single String Pairs
Identifiers link things together
and enable correlation.
They can be endpoints on the
internet.
A claim is by one party about
another or itself.
It does not have to be linked to
an identifier.
Proving you are over 18 for
example and not giving your
real name.
Directed Identifier
These is a types of identifies enable individuals to
use different identifiers for different contexts.
The BC Citizen Services card is “one card” but
when one uses it in a Healthcare content it has a
different identifier then when used within the
context of a drivers license. So the identifier is
“directed” and only used in one context.
Network End-Point Identifier
Identifiers that are also Network End-Points include
Phone numbers
e-mail addresses
Authentication can be performed with the end-point.
That is you can prove you are in position of the end-
point with a challenge - such as a being sent code to a
phone and then entering it into the site asking to confirm
that you are in control of it.
Authentication
AuthN
What you Know
(A Password, OneTime Password)
What you Have (A Credential)
What you Are (Biometric)
Emerging: What you Do (Behavior)
Multi-Factor Authentication
MFA
What you Have (a bank card)
and What you know (The PIN #)
What you Know (Password
and What you Are (A Biometric shared at Enrollment)
Using more then one form of Authentication.
Authorization
AuthZ
This is very different then Authentication which is just
checking that an individual is the same one who
presented themselves with the credentials before.
What are you permitted (authorized) to do in a system?
Enterprise Mountains
ID in Context of Society
Employers
Have Employees
Enterprise Identity
Enterprise Single Sign On
Provisioning
Authentication - AuthN
[Power Relationship]
Employers
Have Employees Contractors
Business Partners
Enterprise Identity
Provisioning
Termination
Enterprise Identity
Access Control
Authorization - AuthZ
Roles
Attributes
Authentication - AuthN
Enterprise Identity
Customers
Enrollment
Claims/Attributes
But its Different…….
More on that later
Enterprise Mountains
Government FootHills
Civic Records
Citizen Identity
Birth
Death
Marriage
Divorce
Parent
Drivers License
Voting
Other Licensing
Health Care
Social Insurance
Taxation
Citizen Identity
The power relationship between the citizen /
subject and government entities is NOT the same
as the power relationship between the employer
and their employee.
The systems used for enterprise identity
management CAN NOT be picked up and
plopped down on citizen <—> government identity
management contexts. It has to work differently.
Enterprise provisioning and termination is clearly not
the same as the government issuance of a birth
certificate and death certificate.
Enterprise Mountains
Government FootHills
Valley of the Commons
Big Co.
Web 1.0 Web 2.0
User-Centric Identity
Self-Sovereign Identity
Valley of the Commons
User-Centric / Self-Sovereign Identity
The Identity Dog
Represents 2 things:
* Freedom to be who you want to be
* Freedom to share more specific
info about yourself that is validated
User-Centric / Self-Sovereign Identity
User-Centric / Self-Sovereign Identity
Freedom to Aggregate
User-Centric / Self-Sovereign Identity
X Freedom to Disaggregate
User-Centric / Self-Sovereign Identity
X
User-Centric / Self-Sovereign Identity
We are not all “vanilla”
Why James Chartrand 

Wears Women’s Underpants
http://www.copyblogger.com/james-chartrand-underpants/
Custodianship?
http://www.flickr.com/photos/seektan/2582803300/sizes/z/in/photostream/
Children
Elders
Custodianship?
FAMILIES
Custodianship?
http://www.flickr.com/photos/jeanlouis_zimmermann/8752148306/sizes/o/in/photostream/
How do people “get”
User Centric Digital Identity today?
Google profiles
Yahoo! profiles
Facebook
LinkedIn
Hack it together with handles from web mail providers
or on a service like Twitter
Challenge with e-mail addresses as identities
the communications token is the “ID”
User-Centric / Self-Sovereign Identity
What are our rights in these commercial
spaces governed by Terms of Service? 

How are we “citizens” in private space?

In physical life we have protection of our
physical self - people will be prosecuted for
harming us. What is the equivalent in online
spaces? 

Freedom to not be “erased” under TOS
User-Centric / Self-Sovereign Identity
Identifier side:
Own their own
domain name.
Have a blog?
Run an openID server?
Claims based side:
Almost impossible.
Little relying party adoption
(Places where 3rd party
or self generated claims
will be accepted)
Little client side app adoption
How do people “get”
User Centric Digtial Identity?
User-Centric / Self-Sovereign Identity
Identifier side: Claims based side:
Emerging Today: How do people “get”
Self-Sovereign Digital Identity today?
User-Centric / Self-Sovereign Identity
Proposed:
Distributed IDentity -> DID
Distributed Ledger Technology
Emerging Networks
for their Exchange
ID/DataWeb
W3C: Verified Claims
Working Group
Personal Data Banks / Stores / Vaults / etc….
What is the context for people gathering?
“We’re trying to build a social
layer for everything.”
- Mark Zuckerburg
User-Centric / Self-Sovereign Identity
Freedom to
Peer-to-Peer Link
Freedom to determine how
the link is seen by others
User-Centric / Self-Sovereign Identity
Freedom to group and cluster outside commercial silos
& business contexts.
Freedom of
Movement and Assembly
User-Centric / Self-Sovereign Identity
•Freedom to Aggregate
•Freedom to Disaggregate
•Freedom to not be “erased” under TOS
•Freedom of Movement and Assembly
•Freedom to Peer-to-Peer link & the
Freedom to determine if the link is seen
by others
•Custodianship is Possible
User Centric Digital Identity is the:
User-Centric / Self-Sovereign Identity
Isn’t just a technical problem
TECHNOLOGY
LEGAL
SOCIAL BUSINESS?
User-Centric / Self-Sovereign Identity
Why have we have yet to succeed?
It is a REALLY hard problem set to solve for,
User Centric Digital Identity that is:
1. open standards based

2. the scale of the internet + other digital systems

3. that people find usable

4. that they understand 

5. that is secure

6. it requires emergence of new social behavior

7. and changes business models & norms
User-Centric / Self-Sovereign Identity
Why have we have yet to succeed?
It is a REALLY hard problem set to solve for,
User Centric Digital Identity that is:
1. open standards based

2. the scale of the internet + other digital systems

3. that people find usable

4. that they understand 

5. that is secure

6. it requires emergence of new social behavior

7. and changes business models & norms
User-Centric / Self-Sovereign Identity
CAUSE IT IS
REALLY HARD…
We are still working on making the vision real
The Internet Identity Workshop Continues
& New Efforts that Complement
* Rebooting Web of Trust * Personal Data Ecosystem
* Re-Decentralize * Personal Data 2016 …
Many protocols emerging - OpenID, OAuth, SCIM,

Frameworks To Believe Veracity Exchange of
Attributes and Identifiers
User-Centric / Self-Sovereign Identity
Enterprise Mountains
Government FootHills
Valley of the Commons
?
Anonymous
?
?
? ?
Per-Post Per-Session
Anonymous
?
Anonymous
✓
Verified
✓ ✓ ✓
Verified
✓ ✓✓
Documentation In Person

Verification
Biometric
Capture
?
Anonymous
One Site Multi-Site
Self-Asserted VerifiedSocially

Validated
✓
Pseudonymous
?
Anonymous
One Site Multi-Site
Self-Asserted Socially

Validated
Verified
✓
Pseudonymous
?
✓
Verified
Anonymity
?
Anonymous
One Site Multi-Site
Self-Asserted Socially

Validated
Verified
✓
Pseudonymous
?
✓
Verified
Anonymity
Over 18 years
Woman Voter

CA Congressional
District 9
Ms.Sue Donna
DOB = 1/21/1982
1823 6th Ave. 

Alameda, CA
?
Anonymous
One Site Multi-Site
Self-Asserted Socially

Validated
Verified
✓
Pseudonymous
?
Anonymous
One Site Multi-Site
Self-Asserted Socially

Validated
Verified
✓
Pseudonymous
?
Anonymous
One Site Multi-Site
Self-Asserted Socially

Validated
Verified
✓
Pseudonymous
http://www.identitywoman.net
?
Anonymous
One Site Multi-Site
Self-Asserted Socially

Validated
Verified
✓
Pseudonymous
✓✓
Limited
Liability
Persona
Big Picture ID Resources
Identity is social.
Identity is subjective.
Identity is valuable.
Identity is referential.
Identity is composite.
Identity is consequential.
Identity is dynamic.
Identity is contextual.
Identity is equivocal.
OECD Paper At a Crossroads: "Personhood” and the Digital Identity in the Information Society
Properties of Identity
1. User Control and Consent
2. Limited Disclosure for Limited Use
3. The Law of Fewest Parties
4. Directed Identity
5. Pluralism of Operators and Technologies
6. Human Integration
7. Consistent Experience Across Contexts
by Kim Cameron - https://www.identityblog.com/?p=354
Laws of Identity
Questions & Answers
Conclusion
Kaliya “Identity Woman” Young
kaliya [at] identitywoman.net

More Related Content

What's hot

The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Kaliya "Identity Woman" Young
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-worldMEDICI
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspectiveFuture Agenda
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Updatekantarainitiative
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementPrabath Siriwardena
 
Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)JISC.AM
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisiswieringa
 
Identity - Past Solutions & Current Blockchain Landscape
 Identity - Past Solutions & Current Blockchain Landscape Identity - Past Solutions & Current Blockchain Landscape
Identity - Past Solutions & Current Blockchain Landscapeaatkin1971
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 kantarainitiative
 

What's hot (20)

The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
Openid
OpenidOpenid
Openid
 
Identity progress-linked-digital-world
Identity progress-linked-digital-worldIdentity progress-linked-digital-world
Identity progress-linked-digital-world
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
Identity Talk at Net Squared 2008
Identity Talk at Net Squared 2008Identity Talk at Net Squared 2008
Identity Talk at Net Squared 2008
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspective
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
 
Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 
Identity - Past Solutions & Current Blockchain Landscape
 Identity - Past Solutions & Current Blockchain Landscape Identity - Past Solutions & Current Blockchain Landscape
Identity - Past Solutions & Current Blockchain Landscape
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 

Viewers also liked

Pitch and putt CoEntrepreneurs Weekend LLN 2014 par Alexandra Leunen
Pitch and putt CoEntrepreneurs Weekend LLN 2014 par Alexandra LeunenPitch and putt CoEntrepreneurs Weekend LLN 2014 par Alexandra Leunen
Pitch and putt CoEntrepreneurs Weekend LLN 2014 par Alexandra LeunenEntrepreneurs Weekend
 
Elevator Pitch - Méthode et astuces
Elevator Pitch - Méthode et astucesElevator Pitch - Méthode et astuces
Elevator Pitch - Méthode et astucesIsabelle GUYOT
 
Storytelling De Marque
Storytelling De MarqueStorytelling De Marque
Storytelling De Marqueguest6ba089
 
JOUR 450 - Client Pitch Presentation for USC Annenberg Admissions
JOUR 450 - Client Pitch Presentation for USC Annenberg AdmissionsJOUR 450 - Client Pitch Presentation for USC Annenberg Admissions
JOUR 450 - Client Pitch Presentation for USC Annenberg AdmissionsShuWen Zhang
 
Fortifiez vos ventes! Quelques astuces de base, par Christian Wopperer et Nad...
Fortifiez vos ventes! Quelques astuces de base, par Christian Wopperer et Nad...Fortifiez vos ventes! Quelques astuces de base, par Christian Wopperer et Nad...
Fortifiez vos ventes! Quelques astuces de base, par Christian Wopperer et Nad...CLDEM
 
Les clés pour bien pitcher
Les clés pour bien pitcherLes clés pour bien pitcher
Les clés pour bien pitcherOsonsLeDesign
 
Le Business storytelling expliqué pas à pas pour vous aider à créer votre mar...
Le Business storytelling expliqué pas à pas pour vous aider à créer votre mar...Le Business storytelling expliqué pas à pas pour vous aider à créer votre mar...
Le Business storytelling expliqué pas à pas pour vous aider à créer votre mar...TALK2LEAD
 

Viewers also liked (11)

Pitch and putt CoEntrepreneurs Weekend LLN 2014 par Alexandra Leunen
Pitch and putt CoEntrepreneurs Weekend LLN 2014 par Alexandra LeunenPitch and putt CoEntrepreneurs Weekend LLN 2014 par Alexandra Leunen
Pitch and putt CoEntrepreneurs Weekend LLN 2014 par Alexandra Leunen
 
Elevator Pitch - Méthode et astuces
Elevator Pitch - Méthode et astucesElevator Pitch - Méthode et astuces
Elevator Pitch - Méthode et astuces
 
Storytelling De Marque
Storytelling De MarqueStorytelling De Marque
Storytelling De Marque
 
JOUR 450 - Client Pitch Presentation for USC Annenberg Admissions
JOUR 450 - Client Pitch Presentation for USC Annenberg AdmissionsJOUR 450 - Client Pitch Presentation for USC Annenberg Admissions
JOUR 450 - Client Pitch Presentation for USC Annenberg Admissions
 
Le Perfect pitch
Le Perfect pitchLe Perfect pitch
Le Perfect pitch
 
Fortifiez vos ventes! Quelques astuces de base, par Christian Wopperer et Nad...
Fortifiez vos ventes! Quelques astuces de base, par Christian Wopperer et Nad...Fortifiez vos ventes! Quelques astuces de base, par Christian Wopperer et Nad...
Fortifiez vos ventes! Quelques astuces de base, par Christian Wopperer et Nad...
 
La découverte du client
La découverte du clientLa découverte du client
La découverte du client
 
Les clés pour bien pitcher
Les clés pour bien pitcherLes clés pour bien pitcher
Les clés pour bien pitcher
 
Pitch Or Elevator Pitch
Pitch Or Elevator PitchPitch Or Elevator Pitch
Pitch Or Elevator Pitch
 
Twitter- Cyxymu
Twitter- CyxymuTwitter- Cyxymu
Twitter- Cyxymu
 
Le Business storytelling expliqué pas à pas pour vous aider à créer votre mar...
Le Business storytelling expliqué pas à pas pour vous aider à créer votre mar...Le Business storytelling expliqué pas à pas pour vous aider à créer votre mar...
Le Business storytelling expliqué pas à pas pour vous aider à créer votre mar...
 

Similar to Identity 101: Boot Camp for Identity North 2016

Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008eComm2008
 
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...PayPalX Developer Network
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...Chema Alonso
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptxLyndaWillett
 
Claim based authentaication
Claim based authentaicationClaim based authentaication
Claim based authentaicationSean Xiong
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617Lifelog Health
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?sorenpeter
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
 
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfDefi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfssuser00208b
 
Opening Up User-Centric Identity
Opening Up User-Centric IdentityOpening Up User-Centric Identity
Opening Up User-Centric IdentityEduserv Foundation
 
BeenVerified Berkman Center Submission
BeenVerified Berkman Center SubmissionBeenVerified Berkman Center Submission
BeenVerified Berkman Center Submissioncanarickd
 
BeenVerified Berkman Submission
BeenVerified Berkman SubmissionBeenVerified Berkman Submission
BeenVerified Berkman Submissioncanarickd
 

Similar to Identity 101: Boot Camp for Identity North 2016 (20)

Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
 
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
 
Digital Identity (Digital ATL)
Digital Identity (Digital ATL)Digital Identity (Digital ATL)
Digital Identity (Digital ATL)
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptx
 
Claim based authentaication
Claim based authentaicationClaim based authentaication
Claim based authentaication
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617Validide Corporation Pitch Deck 20210617
Validide Corporation Pitch Deck 20210617
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart cities
 
Blockchain in HR
Blockchain in HRBlockchain in HR
Blockchain in HR
 
Digital Identities
Digital IdentitiesDigital Identities
Digital Identities
 
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfDefi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
 
Opening Up User-Centric Identity
Opening Up User-Centric IdentityOpening Up User-Centric Identity
Opening Up User-Centric Identity
 
BeenVerified Berkman Center Submission
BeenVerified Berkman Center SubmissionBeenVerified Berkman Center Submission
BeenVerified Berkman Center Submission
 
BeenVerified Berkman Submission
BeenVerified Berkman SubmissionBeenVerified Berkman Submission
BeenVerified Berkman Submission
 

More from Kaliya "Identity Woman" Young

My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.Kaliya "Identity Woman" Young
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemKaliya "Identity Woman" Young
 
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...Kaliya "Identity Woman" Young
 
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...Kaliya "Identity Woman" Young
 

More from Kaliya "Identity Woman" Young (14)

Aadhaar Identity North Presentation
Aadhaar Identity North PresentationAadhaar Identity North Presentation
Aadhaar Identity North Presentation
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
 
Identity and Context : People and Personal Data
Identity and Context : People and Personal DataIdentity and Context : People and Personal Data
Identity and Context : People and Personal Data
 
Identification and social justice
Identification and social justiceIdentification and social justice
Identification and social justice
 
ID & Data presented at SDForum TechWomen
ID & Data presented at SDForum TechWomenID & Data presented at SDForum TechWomen
ID & Data presented at SDForum TechWomen
 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy Workshop
 
Iiw11introtalk
Iiw11introtalkIiw11introtalk
Iiw11introtalk
 
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
 
IIW-East Introduction to Identity Community
IIW-East Introduction to Identity CommunityIIW-East Introduction to Identity Community
IIW-East Introduction to Identity Community
 
Us our Organizations and the Evolving Web v2
Us our Organizations and the Evolving Web  v2Us our Organizations and the Evolving Web  v2
Us our Organizations and the Evolving Web v2
 
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
Internet Identity Workshop 10 - Introduction to the User-Centric Identity Com...
 
OpenID 101
OpenID 101OpenID 101
OpenID 101
 
OpenID 101
OpenID 101OpenID 101
OpenID 101
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Identity 101: Boot Camp for Identity North 2016